cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-44808,https://securityvulnerability.io/vulnerability/CVE-2023-44808,Stack Overflow Vulnerability in D-Link DIR-820L Router,"The D-Link DIR-820L router version 1.05B03 is susceptible to a stack overflow vulnerability in the sub_4507CC function, which could potentially allow an attacker to execute arbitrary code. This weakness can be exploited to compromise the device, leading to unauthorized access to the network and subsequent risks to data integrity and confidentiality. Users are encouraged to monitor their device security and apply any necessary patches or updates.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.002469999948516488,false,,false,false,false,,,false,false,,2023-10-16T00:00:00.000Z,0 CVE-2023-44809,https://securityvulnerability.io/vulnerability/CVE-2023-44809,Insecure Permissions Flaw in D-Link DIR-820L Router,"The D-Link DIR-820L router, specifically version 1.05B03, has been identified to have an insecure permissions vulnerability. This flaw can be exploited by attackers to gain unauthorized access to sensitive configurations and functionalities of the device, potentially compromising the entire network. Users are advised to ensure proper permissions are configured to mitigate potential security risks.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.009929999709129333,false,,false,false,false,,,false,false,,2023-10-16T00:00:00.000Z,0 CVE-2023-44807,https://securityvulnerability.io/vulnerability/CVE-2023-44807,Stack Overflow Vulnerability in D-Link DIR-820L Router,"The D-Link DIR-820L router is impacted by a stack overflow vulnerability within its cancelPing function. This flaw may allow attackers to exploit the buffer overflow, leading to potential remote code execution or denial of service. Users of impacted firmware versions are urged to apply the latest security updates to protect their devices.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.002259999979287386,false,,false,false,false,,,false,false,,2023-10-06T00:00:00.000Z,0 CVE-2023-25282,https://securityvulnerability.io/vulnerability/CVE-2023-25282,Heap Overflow Vulnerability in D-Link DIR820LA,"D-Link DIR820LA is vulnerable to a heap overflow flaw that allows malicious actors to trigger a denial of service condition. By exploiting the 'config.log_to_syslog' and 'log_opt_dropPackets' parameters within the 'mydlink_api.ccp', an attacker could manipulate the device's logging functionality, leading to potential disruption of service. This vulnerability poses significant risks to users as it could impact the availability of the network services dependent on the affected router.",D-Link,Dir-820l Firmware,6.5,MEDIUM,0.0009899999713525176,false,,false,false,false,,,false,false,,2023-03-15T00:00:00.000Z,0 CVE-2023-25283,https://securityvulnerability.io/vulnerability/CVE-2023-25283,Stack Overflow Vulnerability in D-Link DIR Series Router,"A stack overflow vulnerability has been identified in the D-Link DIR820LA1_FW106B02 router. This flaw allows attackers to manipulate the reserveDHCP_HostName_1.1.1.0 parameter in lan.asp. Exploiting this vulnerability can lead to a denial of service, impacting the router's ability to perform standard functions and potentially disrupting network services. It is crucial for users to be aware of this vulnerability and to take proactive steps to secure their network devices.",D-Link,Dir-820l Firmware,7.5,HIGH,0.0020200000144541264,false,,false,false,false,,,false,false,,2023-03-13T00:00:00.000Z,0 CVE-2023-25279,https://securityvulnerability.io/vulnerability/CVE-2023-25279,OS Command Injection Vulnerability in D-Link DIR820LA Router,"An OS command injection vulnerability exists in the firmware of the D-Link DIR820LA router, specifically version 1.05B03. This vulnerability allows attackers to craft specific payloads capable of escalating privileges to root level. Exploiting this flaw can lead to unauthorized access and potential control over the affected device, threatening the integrity of the user's network. It is crucial for users to apply the latest security updates from D-Link to mitigate this risk and protect their systems.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.008589999750256538,false,,false,false,false,,,false,false,,2023-03-13T00:00:00.000Z,0 CVE-2022-26258,https://securityvulnerability.io/vulnerability/CVE-2022-26258,Remote Command Execution Vulnerability in D-Link DIR-820L Router,"A remote command execution flaw has been identified in D-Link's DIR-820L router version 1.05B03, which can be exploited via a malicious HTTP POST request. This vulnerability allows attackers to execute arbitrary commands on the device, potentially compromising network security and user data. D-Link users are advised to apply appropriate security measures to mitigate risks associated with this vulnerability. For further details, please refer to the D-Link security bulletin and associated resources.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.6988300085067749,true,2022-09-08T00:00:00.000Z,false,false,true,2022-09-08T00:00:00.000Z,,false,false,,2022-03-28T00:15:00.000Z,0 CVE-2021-45382,https://securityvulnerability.io/vulnerability/CVE-2021-45382,Remote Command Execution Vulnerability in D-Link Routers,"A security flaw has been identified in the D-Link DIR series routers that allows remote command execution via the Dynamic Domain Name System (DDNS) function. Affected models include DIR-810L, DIR-820L, DIR-826L, DIR-830L, and DIR-836L across all hardware revisions. These devices have reached their End of Life (EOL) status, which means they will not receive patches or updates to mitigate this vulnerability. Users are strongly advised to consider replacing their devices to maintain network security.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.9738699793815613,true,2022-04-04T00:00:00.000Z,false,false,true,2022-04-04T00:00:00.000Z,,false,false,,2022-02-17T20:07:46.000Z,0